The implementation of mobile technology applications that operate on a Mobile Operating System must be reviewed and approved by the Mobile Technology and Endpoint Security Engineering Team: See Category tab/Comparable for the corresponding Mobile entry. This entry only covers the Desktop Edition of this technology. For more information on the use of cloud services and cloud-based products within VA, including VA private clouds, please see the Enterprise Cloud Solutions Office (ECSO) Portal at: Cloud services provided by the VAEC, which are listed in the VAEC Service Catalog, and those controlled and managed by an external Cloud Service Provider (i.e. This includes technologies deployed as software installations on VMs within VA-controlled cloud environments (e.g. The TRM decisions in this entry only apply to technologies and versions owned, operated, managed, patched, and version-controlled by VA. More information on the proper use of the TRM can be found on theĬisco An圜onnect Secure Mobility Client provides endpoint security, policy enforcement, and encrypted network connectivity for a variety of platforms to allow corporate network access. Technologies must be operated and maintained in accordance with Federal and Department security and
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |